An Automatic Analysis System for Firearm Identification Based on Ballistics Projectile
Characteristic markings on the cartridge and projectile of a bullet are produced when a gun is fired. Over thirty different features within these marks can be distinguished, which in combination produce a ”fingerprint” for identification of a firearm. Given a means of automatically analyzing features within such a firearm fingerprint, it will be possible to identify not only the type and model of a firearm, but also each individual weapon as effectively as human fingerprint identification can be achieved. In this paper, a new analytic system based on fast Fourier transform (FFT) for identifying the projectile specimens digitized using the line-scan imaging technique automatically is proposed. Experimental results show that the proposed system has the ability of efficient and precise analysis and identification for projectiles specimens.
KeywordsFast Fourier Transform Angular Spectrum Fast Fourier Transform Spectrum Ballistic Specimen Automatic Analysis System
Unable to display preview. Download preview PDF.
- 1.Smith, C.L., Cross, J.M.: Optical Imaging Techniques for Ballistics Specimens to Identify Firearms. In: Proceedings of the 29th Annual 1995 International Carnahan Conference on Security Technology, England, October 1995, pp. 275–289 (1995)Google Scholar
- 2.Saferstein, R.: Forensic Science Handbook, vol. 2. Prentice Hall, Englewood Cliffs (1988)Google Scholar
- 3.Xin, L.-P.: A Cartridge Identification System for Firearm Authentication. In: WCCC_ICSP 2000. 5th International Conference, vol. 2, pp. 1405–1408 (2000)Google Scholar
- 4.Kou, C., Tung, C.-T., Fu, H.C.: FISOFM: Firearms Identification based on SOFM Model of Neural Network. In: Institute of Electrical and Electronics Engineers 28th Annual 1994 International Carnahan Conference, October 12-14, pp. 120–125 (1994)Google Scholar
- 5.Smith, C.L., Robinson, M., Evans, P.: Line-scan Imaging for the positive identification of ballistics. In: International Carnahan Conference on Security Technology, pp. 269–275 (2000)Google Scholar